Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932113AbbBTBtJ (ORCPT ); Thu, 19 Feb 2015 20:49:09 -0500 Received: from mail-ie0-f170.google.com ([209.85.223.170]:36765 "EHLO mail-ie0-f170.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752711AbbBTBtI (ORCPT ); Thu, 19 Feb 2015 20:49:08 -0500 MIME-Version: 1.0 In-Reply-To: <20150220010506.GA10837@node.dhcp.inet.fi> References: <54E5DFED.9050700@citrix.com> <20150220010506.GA10837@node.dhcp.inet.fi> Date: Thu, 19 Feb 2015 17:49:07 -0800 X-Google-Sender-Auth: 4T8w1FGFE7B2QcQQdqAVDtd0D1I Message-ID: Subject: Re: NUMA_BALANCING and Xen PV guest regression in 3.20-rc0 From: Linus Torvalds To: "Kirill A. Shutemov" Cc: David Vrabel , Mel Gorman , "linux-kernel@vger.kernel.org" , "Xen-devel@lists.xen.org" Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1084 Lines: 25 On Thu, Feb 19, 2015 at 5:05 PM, Kirill A. Shutemov wrote: > > I'm feeling I miss very basic background on how Xen works, but why does it > set _PAGE_GLOBAL on userspace entries? It sounds strange to me. It is definitely strange. I'm guessing that it's some ancient Xen hack for the early Intel virtualization that used to have absolutely horrendous vmenter/exit costs, including very much the TLB overhead. \ These days, Intel has address space identifiers, and doesn't flush the whole TLB on VM entry/exit, so it's probably pointless to play games with the global bit. I get the feeling that a lot of Xen stuff is that kind of "legacy hacks" that should just be cleaned up, but nobody has the energy or the interest. There was the whole odd crazy SHARED_KERNEL_PMD hackery too. Linus -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/